메뉴 건너뛰기




Volumn 129, Issue , 2014, Pages 146-161

To eavesdrop or jam, that is the question

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; FADING CHANNELS; INTERFERENCE SUPPRESSION; JAMMING; NETWORK LAYERS;

EID: 84943235784     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-04105-6_10     Document Type: Conference Paper
Times cited : (24)

References (37)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A. D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355-1387 (1975).
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24, 339-348 (1978).
    • (1978) IEEE Trans. Inf. Theor , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 45249119255 scopus 로고    scopus 로고
    • Secure communications over fading channels
    • Liang, Y., Poor, H. V., Shamai, S.: Secure communications over fading channels. IEEE Trans. Inf. Theor. 54, 2470-2492 (2008).
    • (2008) IEEE Trans. Inf. Theor , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 6
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Gopala, P. K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theor. 54, 4687-4698 (2008).
    • (2008) IEEE Trans. Inf. Theor , vol.54 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 7
    • 51649104068 scopus 로고    scopus 로고
    • Secrecy capacity region of parallel broadcast channels
    • Liang, Y., Poor, H. V., Shamai, S.: Secrecy capacity region of parallel broadcast channels. In: ITA 2007, pp. 1291-1295 (2007).
    • (2007) ITA 2007 , pp. 1291-1295
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 8
    • 44049095075 scopus 로고    scopus 로고
    • Secret communication via multi-antenna transmission
    • Li, Z., Trappe, W., Yates, R.: Secret communication via multi-antenna transmission. In: CISS 2007, pp. 905-910 (2007).
    • (2007) CISS 2007 , pp. 905-910
    • Li, Z.1    Trappe, W.2    Yates, R.3
  • 9
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Khisti, A., Wornell, G.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theor. 56, 3088-3104 (2010).
    • (2010) IEEE Trans. Inf. Theor , vol.56 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 10
    • 45249085230 scopus 로고    scopus 로고
    • Secure communication with a fading eavesdropper channel
    • Li, Z., Yates, R., Trappe, W.: Secure communication with a fading eavesdropper channel. In: ISIT 2007, pp. 1296-1300 (2007).
    • (2007) ISIT 2007 , pp. 1296-1300
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 13
    • 84877662582 scopus 로고    scopus 로고
    • Physical layer security in wireless networks with passive and active eavesdroppers
    • Chortiy, A., Perlazay, S. M., Han, Z., Poor, H. V.: Physical layer security in wireless networks with passive and active eavesdroppers. In: IEEE GlobeCom 2012, pp. 4868-4873 (2012).
    • (2012) IEEE GlobeCom 2012 , pp. 4868-4873
    • Chortiy, A.1    Perlazay, S.M.2    Han, Z.3    Poor, H.V.4
  • 14
    • 84890816230 scopus 로고    scopus 로고
    • The eavesdropping and jamming dilemma in multichannel communications
    • Garnaev, A., Trappe, W.: The eavesdropping and jamming dilemma in multichannel communications. In: IEEE ICC 2013, pp. 753-757 (2013).
    • (2013) IEEE ICC 2013 , pp. 753-757
    • Garnaev, A.1    Trappe, W.2
  • 15
    • 84856969548 scopus 로고    scopus 로고
    • Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    • Zhu, Q., Saad, W., Han, Z., Poor, H. V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: MilCom 2011, pp. 119-124 (2011).
    • (2011) MilCom 2011 , pp. 119-124
    • Zhu, Q.1    Saad, W.2    Han, Z.3    Poor, H.V.4    Basar, T.5
  • 16
    • 63749110244 scopus 로고    scopus 로고
    • A game-theoretic analysis of denial of service attacks in wireless random access
    • Sagduyu, Y. E., Ephremides, A.: A game-theoretic analysis of denial of service attacks in wireless random access. J. Wirel. Netw. 15, 651-666 (2009).
    • (2009) J. Wirel. Netw , vol.15 , pp. 651-666
    • Sagduyu, Y.E.1    Ephremides, A.2
  • 17
    • 84869597150 scopus 로고    scopus 로고
    • Jamming game in a dynamic slotted ALOHA network
    • Jain, R., Kannan, R. (eds.),. Springer, Heidelberg
    • Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429-443. Springer, Heidelberg (2012).
    • (2012) GameNets 2011. LNICST , vol.75 , pp. 429-443
    • Garnaev, A.1    Hayel, Y.2    Altman, E.3    Avrachenkov, K.4
  • 19
    • 84866940712 scopus 로고    scopus 로고
    • A Bayesian Jamming Game in an OFDM Wireless Network
    • Garnaev, A., Hayel, Y., Altman, E.: A Bayesian Jamming Game in an OFDM Wireless Network. In: WiOpt 2012, pp. 41-48 (2012).
    • (2012) WiOpt 2012 , pp. 41-48
    • Garnaev, A.1    Hayel, Y.2    Altman, E.3
  • 21
    • 84877655292 scopus 로고    scopus 로고
    • Dependence of optimal monitoring strategy on the application to be protected
    • Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: IEEE GlobeCom 2012, 1054-1059 (2012).
    • (2012) IEEE GlobeCom 2012 , pp. 1054-1059
    • Garnaev, A.1    Trappe, W.2    Kung, C.-T.3
  • 22
    • 84890827106 scopus 로고    scopus 로고
    • Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments
    • Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: CrownCom 2013 (2013).
    • (2013) CrownCom 2013
    • Garnaev, A.1    Trappe, W.2    Kung, C.-T.3
  • 23
    • 79951614632 scopus 로고    scopus 로고
    • Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
    • Mukherjee, A., Swindlehurst, A. L.: Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In: MilCom 2010, pp. 1695-1700 (2010).
    • (2010) MilCom 2010 , pp. 1695-1700
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 25
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the MAC layer in wireless ad hoc networks
    • Gupta, V., Krishnamurthy, S. V., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: MilCom 2002, pp. 1118-1123 (2002).
    • (2002) MilCom 2002 , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 26
    • 1542360013 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • Kyasanur, P., Vaidya, N.: Detection and handling of MAC layer misbehavior in wireless networks. In: DSN 2003, pp. 173-182 (2003).
    • (2003) DSN 2003 , pp. 173-182
    • Kyasanur, P.1    Vaidya, N.2
  • 27
    • 34548314598 scopus 로고    scopus 로고
    • Optimal jamming attack and network defense policies in wireless sensor networks
    • Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack and network defense policies in wireless sensor networks. In: Infocom 2007, pp. 1307-1315 (2007).
    • (2007) Infocom 2007 , pp. 1307-1315
    • Li, M.1    Koutsopoulos, I.2    Poovendran, R.3
  • 28
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • Xu, X., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005, pp. 46-57 (2005).
    • (2005) MobiHoc 2005 , pp. 46-57
    • Xu, X.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 29
    • 50649125455 scopus 로고    scopus 로고
    • Game theoretic modeling of malicious users in collaborative networks
    • Theodorakopoulos, G., Baras, J. S.: Game theoretic modeling of malicious users in collaborative networks. IEEE JSAC 26, 1317-1327 (2008).
    • (2008) IEEE JSAC , vol.26 , pp. 1317-1327
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 30
    • 0026240492 scopus 로고
    • Jamming in slotted ALOHA multihop packet radio networks
    • Zander, J.: Jamming in slotted ALOHA multihop packet radio networks. IEEE Trans. Comm. 39, 1525-1531 (1991).
    • (1991) IEEE Trans. Comm , vol.39 , pp. 1525-1531
    • Zander, J.1
  • 31
    • 77349115760 scopus 로고    scopus 로고
    • Fair resource allocation in wireless networks in the presence of a jammer
    • Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338-349 (2010).
    • (2010) Perform. Eval , vol.67 , pp. 338-349
    • Altman, E.1    Avrachenkov, K.2    Garnaev, A.3
  • 32
    • 79956100559 scopus 로고    scopus 로고
    • Jamming in wireless networks under uncertainty
    • Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks under uncertainty. Mob. Netw. Appl. 16, 246-254 (2011).
    • (2011) Mob. Netw. Appl , vol.16 , pp. 246-254
    • Altman, E.1    Avrachenkov, K.2    Garnaev, A.3
  • 33
    • 77953987046 scopus 로고    scopus 로고
    • A jamming-resistant MAC protocol for single-hop wireless networks
    • Awerbuch, B., Richa, A. W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: ACM PODC 2008 (2008).
    • (2008) ACM PODC 2008
    • Awerbuch, B.1    Richa, A.W.2    Scheideler, C.3
  • 34
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO gaussian fading channels
    • Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on MIMO gaussian fading channels. IEEE Trans. Inf. Theor. 50, 2119-2123 (2004).
    • (2004) IEEE Trans. Inf. Theor , vol.50 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3
  • 36
    • 0034250315 scopus 로고    scopus 로고
    • Analysis of an On-Off jamming situation as a dynamic game
    • Mallik, R. K., Scholtz, R. A., Papavassilopoulos, G. P.: Analysis of an On-Off jamming situation as a dynamic game. IEEE Trans. Comm. 48, 1360-1373 (2000).
    • (2000) IEEE Trans. Comm , vol.48 , pp. 1360-1373
    • Mallik, R.K.1    Scholtz, R.A.2    Papavassilopoulos, G.P.3
  • 37
    • 63449130855 scopus 로고    scopus 로고
    • Transmission power control game with SINR as objective function
    • Altman, E., Chaintreau, A. (eds.),. Springer, Heidelberg
    • Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112-120. Springer, Heidelberg (2009).
    • (2009) NET-COOP 2008. LNCS , vol.5425 , pp. 112-120
    • Altman, E.1    Avrachenkov, K.2    Garnaev, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.